CVE-2026-24164

| EUVD-2026-17516 HIGH
2026-03-31 nvidia
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 31, 2026 - 17:16 euvd
EUVD-2026-17516
Analysis Generated
Mar 31, 2026 - 17:16 vuln.today
CVE Published
Mar 31, 2026 - 16:24 nvd
HIGH 8.8

Description

NVIDIA BioNeMo contains a vulnerability where a user could cause a deserialization of untrusted data. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

Analysis

Insecure deserialization in NVIDIA BioNeMo Framework enables remote code execution when attackers can induce users to process malicious serialized data. This vulnerability (CWE-502) affects the BioNeMo Framework with network-reachable attack surface (AV:N) and low complexity (AC:L), requiring only user interaction (UI:R) but no authentication (PR:N). …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify and inventory all systems running NVIDIA BioNeMo Framework; restrict network access to BioNeMo services to trusted networks only; disable or isolate affected deployments if business operations permit. Within 7 days: Implement input validation and sandboxing controls for all serialized data processed by BioNeMo; review logs for suspicious deserialization activity or user reports of unexpected behavior; brief development and research teams on the restriction of untrusted data sources. …

Sign in for detailed remediation steps.

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +44
POC: 0

Share

CVE-2026-24164 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy